Tuesday, November 27, 2007


Rather than limiting your web search to Google, Yahoo, Ask.com or whatever search site you are currently using, try www.metacrawler.com
This site uses all of the above and gives results from all of them. They also seem to have a way to rank them very effectively. One of our members recommends this site for all but the most simple searches. Give it a try.

On-line Shopper Alert

Net surfers tread treacherous water
Cyber crooks target online shoppers with new scams

By Byron Acohido

SEATTLE - A confluence of commerce and criminal activity may turn the next four weeks into the most dangerous period ever to surf the Internet.

"Given the kickoff to the holidays the increasing sophistication of cyber thieves, these may be the risk­iest days for Internet consumers we've ever seen," says Bill Morrow chairman of security firm CSldentity.

Consumers' high comfort level ordering gifts at their keyboards is translating into record traffic to websites that review, advertise and sell popular products. Re­tailers aren't the only ones trying to capitalize. Tech se­curity authorities warn online shoppers about these snares set in place by organized cybercrime rings:

Spam scams. Be wary of e-mail luring you Co buy drugs, invest in small companies or click to a greeting card or news story. Many of these are scams. Delete any e-mail directing you to type in a credit card num­ber, or other sensitive data, to make a charitable dona­tion. "E-mail is never a safe way to transmit informa­tion," Morrow says.

Fake ads. Do not click on ads using scare tactics to get you to buy Spy-Shredder, AntiVirGear, MalwareA-larm or some 40 other products with similar names. Online ads pitching fake anti-spyware increased 1,000% in October, says Don Jackson, virus researcher at SecureWorks.

In the past, such ads popped up mostly on porn sites or other obscure sites. But they've begun to appear on websites for CNN, The Economist, the Huffington Post. Major League Baseball, the National Hockey League and Monster.com.

If communications on online forums where cyber crooks hang out are any indication, there's more to come. "We've seen a big increase in that type of chat­ter on forums in the last 30 days," Jackson says.

Tainted Web 2.0. Sites that use nifty Web 2.0 fea­tures are under siege. Case in point; The personalized log-off page at lndiaiimes.com earlier this month was corrupted so that anyone who used that service got in­undated with commands to automatically click to hundreds of Web ads. This was part of an elaborate scam to earn fraudulent "click-through" ad revenue.

Web 2.0 features at a British jewelry website, an au­to-information site and a major job-finding site were identically compromised, says Mary Landesman, sen­ior security researcher at ScanSafe. Hundreds of other Web 2.0 sites are being similarly corrupted, she says."These sorts of attacks impact people who are very careful about where they surf and only go to the most reputable sites," Landesman says. "That's why the at­tackers focus so much energy on doing this, because it's a bonanza for them."

ScanSafe offers a free tool that rates the safety of websites, available at scandoo.com.

SOURCE: This article appeared in USA TODAY Monday Nov 26, 2007

Thursday, November 22, 2007



Thursday, November 1, 2007


The following question was posed at today’s meeting. Though I set the screen saver it never activates? Why?

To rule out procedural errors please follow the steps below in an attempt to activate the screen saver. Note that the last step requires clicking the APPLY button first and then the OK button. If this does not resolve the problem please submit a comment so we can be driven crazy attempting to communally resolve this conundrum.

1. To change/set up a screen saver right click in a plain area of the windows desktop and then select PROPERTIES at the bottom of the menu that opens up.
2. Select the SCREEN SAVER tab.
3. UNDER THE HEADING Screen Saver click on the drop down arrow head and select one of the basic patterns such as Blank or Windows.
4. Select the SETTINGS button for additional options and the PREVIEW button to see the results.
5. In the WAIT box enter a time for the computer to be idle before the screen saver activates, perhaps 10-15 min. Do not check the ON resume display Welcome screen.
6. Select the APPLY button before selecting the OK button.

Screen savers can use up a lot of the computers resources (energy, memory and processor) particularly the three-dimensionally ones such as 3D FlowerBox and 3D Pipes (the processor runs at 99 to 100%) because these designs are very complex and require constant computations to maintain and update the image. If you are determined to use one of the exotic screen savers reduce the values for speed and complexity to minimize the burden on the processor.